Communications & Media Security Policy


Document Number: ISMS-POL-COM-01

Classification: L1 — Policy (Domain)

Version: 0.1.2

Effective Date: March 1, 2026

Author: Lucas Shin — Security Director

Approved By: Richard — CISO

Next Review Date: February 2027

Parent Policy: Information Security Policy (ISMS-POL-ISP-01)


1. Purpose

This policy defines the security requirements for external communications and media production — including YouTube content, e-book publishing, social media presence, and public-facing materials — to prevent inadvertent disclosure of confidential information, protect client data, and maintain Cybercraft brand integrity.

Cybercraft operates in dual capacity as both a security consultancy and a content producer (YouTube, e-books). This creates a unique risk: content intended for public audiences may inadvertently expose internal configurations, client data, or security architecture details.


2. Scope

2.1 Applicable Activities

2.2 Applicable Personnel

2.3 Out of Scope


3. Screen Capture and Recording Controls

3.1 Corporate Data Exposure Risk

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 5.2 and Section 6:

Content production often involves screen recording or screenshots. When corporate applications are visible, there is a risk of exposing:

3.2 Technical Controls

ControlPlatformEnforcement
Screenshot/screen recording block within managed appsAndroidMAM policy — enforced (cannot bypass)
Screenshot/screen recording block within managed appsiOSMAM policy — limited (watermark only; cannot fully prevent)
Copy/paste block from managed apps to personal appsiOS, AndroidMAM policy — enforced
macOS managed volume isolationmacOSADUE — work data on separate APFS volume; however, screen recording of work apps is technically possible on macOS
Important: On macOS, the ADUE managed volume protects data at rest but does not prevent screen recording. Content creators using macOS must follow the procedural controls in Section 3.3.

3.3 Procedural Controls for Content Production

StepActionOwner
1Close all corporate applications (Teams, Outlook, Edge with corporate sessions) before starting screen recordingContent Creator
2Use a dedicated user profile or browser profile for content production — separate from work profileContent Creator
3Use demo/lab environments for security tool demonstrations — never use production Cybercraft tenantContent Creator
4Review all recordings before publishing — check for notification banners, email previews, Teams messages, or other corporate data leakageContent Creator
5Blur or redact any accidentally captured corporate data before publishingContent Creator

4. Content Security Review

4.1 Pre-Publication Review

All public-facing content must be reviewed for security risks before publication:

Content TypeReview RequiredReviewer
YouTube videos (security tutorials)Self-review by creator + spot check by Security DirectorContent Creator / Lucas
E-books (technical guides)Full review before publicationLucas / Richard
Blog posts / articlesSelf-review by creatorContent Creator
Conference presentationsFull review if client data or CC architecture is referencedLucas / Richard
Social media postsSelf-review — no approval required for general postsContent Creator

4.2 Review Checklist

Before publishing any content, verify:

No client names, logos, or engagement details are visible or referenced without explicit client consent
No internal CC tenant configurations are visible (Intune policies, CA rules, user lists, Entra ID settings)
No real email addresses, phone numbers, or personnel details are exposed
No financial information (invoices, pricing, contracts) is visible
Demo environments were used for tool demonstrations — not production
All notification banners and popups in screen recordings have been reviewed and redacted if needed
Content does not inadvertently disclose Cybercraft's security posture or vulnerabilities that could be exploited

5. Public Disclosure Controls

5.1 What May Be Disclosed

5.2 What Must NOT Be Disclosed

5.3 Client Data in Content


6. Brand Protection

6.1 Consistent Representation

6.2 Incident Response for Public Content

If confidential information is inadvertently published:

StepActionOwnerTimeline
1Immediately remove the content from the public platform (unlist/delete video, retract post)Content CreatorImmediately upon discovery
2Notify Security DirectorContent CreatorWithin 1 hour
3Assess exposure: What data? How long was it public? Who may have seen it?LucasWithin 24 hours
4If client data was exposed: Notify client and escalate to CISOLucas → Richard → FarahWithin 24 hours
5Document in Incident RegisterLucasWithin 72 hours

7. Email-Based Information Transfer Controls

7.1 Scope

This section governs the use of email (Outlook) as a channel for transferring information — particularly Confidential data — to external parties. Internal email communications within the M365 tenant are governed by M365 Workspace & Access Policy (ISMS-POL-M365-01).

7.2 Permitted Use

7.3 Controls

ControlRequirementEnforcement
Confidentiality noticeEmails containing Confidential data must include an appropriate confidentiality disclaimerPolicy-enforced (Outlook signature template recommended)
Attachment reviewSender must verify no unintended Confidential content is included in attachmentsPolicy-enforced (sender responsibility)
Recipient verificationSender must confirm recipient email address before sending Confidential dataPolicy-enforced (Outlook MailTips where available)
EncryptionConfidential attachments should use password protection or M365 Message Encryption when the recipient supports itPolicy-enforced; M365 Message Encryption available for Premium licence holders

7.4 Prohibited

Cross-reference: For the Confidential External Sharing 5-step procedure via Teams, see M365 Workspace Operations Procedure (ISMS-PROC-M365-01) §4. For data classification definitions, see M365 Workspace & Access Policy (ISMS-POL-M365-01) §3.

8. Content Production on BYOD Devices

Derived from BYOD Security Policy (ISMS-POL-BYOD-01) Section 6.1 and 6.2:

When content is produced on personal devices enrolled in BYOD:


9. Roles and Responsibilities

RolePersonResponsibilities
CEOFarahBrand direction, client consent management, public communications authority, marketing oversight
CISORichardPolicy approval, content security review for high-risk publications, incident escalation
Security DirectorLucasPolicy maintenance, content security spot checks, demo environment management, incident response for content-related breaches
Content CreatorDesignated personnelFollow procedural controls, self-review before publication, immediate removal if confidential data is exposed

10. Compliance Mapping

ISO 27001 ControlRequirementCovered By
A.5.10Acceptable use of information and assetsSection 3 (Screen capture controls) + Section 5 (Public disclosure controls)
A.5.14Information transferSection 5 (Public disclosure) + Section 7 (Email-based information transfer controls)
A.5.34Privacy and protection of PIISection 4.2 (Review checklist — no personnel details exposed) + Section 5.3 (Client data consent)
A.6.8Information security event reportingSection 6.2 (Incident response for inadvertent publication)

11. Document Control

VersionDateAuthorChanges
0.1.02026-02-18Lucas ShinInitial release — screen capture controls, content security review, public disclosure controls, brand protection. Incorporates media-related elements from BYOD Security Policy.
0.1.12026-02-20Lucas ShinUpdated cross-reference document numbers to reflect new L2 policy numbering scheme.
0.1.22026-03-01Lucas ShinAdded §7 Email-Based Information Transfer Controls — Confidential data email transfer rules, encryption requirements, prohibited practices. Cross-references to ISMS-PROC-M365-01 §4 and ISMS-POL-M365-01 §3. Renumbered §7→§8 through §10→§11. Updated A.5.14 compliance mapping. Phase 2-5 ISMS 문서 매핑.

Review Schedule


[End of Policy Document]